Nursing Informatics

Usability Tests (Reading & Sharing Cont.)

  • Heuristic Evaluation or Heuristic Inspection Methods
    • the most popular of what are called “discount usability evaluation”
      • because they are typically easy to do, involve fewer than 10 experts, and are much less expensive than other methods.
    • the objective is to detect problems early in the design process, when they can be most easily and economically corrected.
    • they are called “heuristic” because evaluators assess the degree to which the design complies with recognized usability rules of thumb or principles, such as those proposed by Nielsen (1994) (retrieved from https://www.nngroup.com/articles/ten-usability-heuristics/)
      1. visibility of system status
      2. match between system and the real world
      3. user control and freedom
      4. consistency and standards
      5. error prevention
      6. recognition rather than recall
      7. flexibility and efficiency of use
      8. asthetic and minimalist design
      9. help users recognize, diagnose, and recover from errors
      10. help and documentation

Continue reading “Usability Tests (Reading & Sharing Cont.)”

Advertisements
Nursing Informatics

Usability Testing (Reading & Sharing)

Usability: deals with specific issues of human performance during computer interactions for specific tasks within a particular contest.

  • refers to how well the information system product was designed for users to learn as well as to use.
  • refers to how the system allows users to carry out their tasks safely, effectively, and pleasantly.
  • is related to the human-centered design that is characterized by the active involvement of users and the clear understanding of user and task requirements

Usability testing: creating realistic clinical scenarios to which end users are asked to apply configured electronic tools, using the hardware that will be used in production.

The usability of a system can be measured by:

  • Effectiveness (can users successfully achieve their objectives?)
  • Efficiency (how much effort and resource are expended in achieving those objectives?)
  • Satisfaction (was the experience considered satisfactory?)

Continue reading “Usability Testing (Reading & Sharing)”

Nursing Informatics

Ergonomics (Reading & Sharing)

Ergonomics is the science of designing a work environment so that it is convenient to use and does not prove injurious to health. It is used in the United States to describe the design and implementation of equipment, tools, and machines related to human safety, comfort, and convenience.

  • It is the study and design of a work environment that maximizes productivity by reducing operator fatigue and discomfort.
  • It considers physical stresses placed on joints, muscles, nerves, and tendons as well as environmental factors that can affect hearing and vision.
  • Poor setup of computer equipment leads to somatic complaints that include headaches, eyestrain, irritation, stress, fatigue, and neck and back pain.

Continue reading “Ergonomics (Reading & Sharing)”

Nursing Informatics

Downtime / Nursing Informatics Reading and Sharing

Downtime refers to the period of time when an information system is not operational or available for use. Some systems have daily scheduled downtimes, during which maintenance and backup procedures are performed.

Examples of amount of downtime criteria for an information system:

  1. Provides 24-hour system availability with no scheduled daily downtime
  2. Does not have a history of prolonged or frequent unscheduled downtimes
  3. for open repository and comprehensive patient records, minimal downtime should be standard
  4. Most system changes should be able to be made without bringing complete system

Continue reading “Downtime / Nursing Informatics Reading and Sharing”

Nursing Informatics

Dirty Data / Nursing Informatics Reading and Sharing

Data are classified as “dirty” when the database contains errors that render the data inaccurate. This compromises the data integrity. Dirty data may result from human errors in entering data, such as misspelling a name or incorrectly entering an ID number. Dirty data may also result from viruses, worms, or other bugs installed into a system. Hackers may enter a system and alter or remove data. Hardware and software may fail, corrupting or destroying data.